Case Study-Reducing Twenty Five Pages to Two

Name

Professor’s name

Course

Date

Case Study-Reducing Twenty Five Pages to Two

In this scenario, undertaking a change process seemed to work well, but the feedback received told a different tale. The feedback was that the change process was creating pressure on people in terms of workload. As a result, people started carrying work home from the weekends. They began complaining to Ken that their wives were complaining and they could barely keep up. The pressure was coming from the need to meet a monthly deadline. Each month, every department was expected to develop a 25-page report to be distributed to around 60 people. The report highlighted everything, including status updates on specific initiatives and new product developmental goals. While much effort went into developing the report, even employees stopped reading it. If they wanted to know whether they were leading in marketing sales, they would have an assistant run the twenty-five report. They would also reach out to the VP of marketing to find out how the marketing launch of a new product was going. The employees found it difficult to read the 25-page report to access the information they needed. As a result, they decided to transform the monthly report from a 25-page report to a two-page report which was less complicated to read.

Undoubtedly, the first six steps of a successful change were not demonstrated in making a change in this scenario. The six steps for a successful change effort entail; identifying goals and having a strategy, determining how change will affect the organization, putting together a change management team, developing a strategy, implementing a plan, and performing a post-transition review. None of the six steps were successfully observed in deciding to change the monthly report from twenty-five to two pages. They did not identify a goal and come up with a strategy. Instead, they just woke up one day and decided that the monthly report would be two pages long moving forward. Additionally, they did not pause to think about the negative and positive effects the change would have on the entire organization. They just concentrated on the fact that the 25-page report was not working as it took too long to develop and information was buried in detail. Additionally, there is no mention of a change management team, as they did not select a team to handle the issue and neither did they have a strategy for making the change. Additionally, no implementation plan was followed in making the change. Notably, even after making the change, no post-transition review took place. They did not take a moment to review whether having a two-page monthly report was more beneficial than having a 25-page report. They only made the decision based on the fact that having a two-page report would save time and reduce the pressure of people carrying work home with them during the weekends.

There is no denying that this organization took some critical actions to ensure the change effort became successful. For instance, they looked at the day-to-day activities and asked questions such as, “does this really add value? Do I absolutely need this?”. Asking such questions plays a significant role in deciding to do away with the twenty-five-page report and remain with a two-page report. Another critical action they undertook was the email they sent to people noting it was not incremental work. In the email, they made it clear that they were working as a team and that if there was more work to be done, they would reallocate it further down the hierarchy or not at all. This action went a long way in pointing out that reducing the length of the monthly report would go a long way in attaining work-life balance as employees would no longer have the need to carry work home just to meet deadlines.

Adjusting to Life in America

Name

Professor

Course

Date

Adjusting to Life in America

Living and studying in a foreign country is a naturally transforming experience. When I came to America, the mental test of living outside of the “cultural cocoon,” is socially as well as inwardly alienating. The new culture demands one to learn a whole new language, rework personal habits and long for a desire to be a part of. I was so excited to receive my acceptance to a college in the United States. The culture of the United States had influenced me through television, I listened to music from the “States,” I watched their movies and followed the lives of their celebrities the way a monk does Buddha. I was so confident I had all it took to be an American.

It is unimaginable how it felt after just one week of realizing my “American training” was not even nearly enough. The change in culture, food, and language was devastating. What also devastated me more was my failure, I considered Americans really cool and would give anything to be like them, speak like they do with a touch of pride, speak out my mind, and have an interesting walk. For a week I was on a burger diet. It was the only thing I could eat because I used to back home because my friends and I enjoyed it from time to time at the local McDonalds. After one week, however, it was not fun anymore. Everything was in shambles, I had been paired with these boys from Africa, and because I spent most of the time in my room, I was yet to meet any Chinese students although I knew there were several at my new school. I could not communicate because of my strong accent, I was able to write decent English and speak to, but the accent was so heavy that the only thing a woman at the canteen heard was burger.

I was so insecure, depressed, and anxious all the time, especially every time I walked past these huge white football players. Almost all the movies I had watched showed well-built college athletes beating up on the weak kid. Sometimes I missed home so much it turned into tears. But I was determined. I read articles online on how to adapt to a foreign country and tried to adopt the tips. The most important one was learning to be away from home, from family, friends, the culture and even the weather. I stilled cried, but after I was done, I reminded myself that home will still be there and I had a purpose here. Staying in contact with people at home also offered huge encouragement and helped ease the burden of missing them.

Change is not always bad, and after a few months, we were friends with my roommate from Africa John Leti, and we spent time sharing stories of home, and the memories slowly covered the awful feeling. He had learnt to understand me, and I could make out word under his accent as well. I had honestly improved as a person, and in a few months, I was immersed in a foreign culture, and the little boy that used to cry was now grown. Unlike my fellow Asians, I did not spend time in Asian groups. My mind was open to the world, and I had friends from all over the world. John and I had become inseparable, and so I tried to join a Chinese group, and since I could not leave John behind, he tagged along. However, all they did was speak Chinese, and that was no place for John and also for me. I was offered a gateway to the world; why would I decide to stay outside.

Today, I am a full American. I am not yet a citizen, but I get calls walking through the hallways, which makes me very proud. My decisions brought me the happiness and comfort I longed for. Looking back, I see the growth and I see myself as a testimony for a foreigner encountering every possible challenge of a new environment to fully adapt. I have had adventures beyond learning and interacted with the world through wonderful people. Today I am the go-to person for fellow Chinese students joining our school. I try to encourage them to be open-minded, and most of them are happy and comfortable.

Morning after Pills

Morning after Pills

Name

Institutional Affiliation

Introduction

Almost half of pregnancies in the world are unintended and Emergency contraception provides women opportunity to avoid pregnancy after unprotected intercourse. Emergency contraception are vital for the larger number of women at risk of pregnancy but do not use regular method and offers reassurance to people using condoms but experience condom slippage or breakage. Significance of morning-after pills has seen Canada allowing it as a nonprescription drug that pharmacists may dispense it directly to women anytime they need it. The Morning – after pills just like a regular birth control pill although it is much stronger and it functions by preventing ovulation thus avoiding contraception or implantation if ovulation occurs. Generally, Morning-after pills prevent an unplanned pregnancy in various situations including; when no contraception was used, missed birth control pills, the condom slipped or broke, the diaphragm dislodged during sexual intercourse, error in the calculation of the fertility period and non-consensual sexual intercourse.

When Can the Morning-after pills used?

Morning-after pills contain hormones similar to the content of regular birth control pills and they prevent pregnancy primarily by preventing ovaries from releasing eggs. Moreover, the pills usually make cervical mucus thick hence prohibiting sperms from mixing with egg and causing fertilization. The functionally of the pills largely depend on the stage of the menstrual cycle in women. Depending on the stage of the menstrual cycle, the contraception may delay or stop the release of the egg, change the lining of the uterus, and finally alter the movement of the egg and sperm by limiting their speed. However, the morning-after pills are never effective for pregnancies implanted in the uterus. It should be noted that morning-after pills are not worth relied on and should only be considered as last chance contraception. Effectiveness of the morning-after pills is within a certain period including immediately after unprotected intercourse up to 5 days or 120 hours. However, they always work best when taken immediately after unprotected sex instead of waiting for the fifth day because the longer an individual waits for the pills, the lesser their chance of working.

Types of Morning-after Pills

There are two hormonal types of morning-after pills whose effectiveness, prices and side effects differ slightly. The first type of morning-after pills is known as plan B that contains progestin hormone and is taken as 2 pills. Plan B pills can either be taken immediately or 1 pill taken right away and the other pill taken in 12 hours although taking two pills instantly is easier and effective. Another type of morning-after pills is Ovral pills that contain two hormones including estrogen and progestin and are served in 4 pills. 2 pills of the Ovral pills are taken immediately while the other two are taken 12 hours later. Significantly, the pills are always most effective if taken within 24 hours of unprotected sex although they can be effective up to 5 days or 120 hours after sexual intercourse. Plan B pills effectiveness in the first 24 hours is considered as 95% of possible pregnancies, between 25 and 48 hours, it prevents 85% of possible pregnancies while between 49 and 120 hours the effectiveness drops gradually to 58% at 72 hours. On the other hand, Ovral prevents about 77% of possible pregnancies in the first 24 hours, 36% of possible pregnancies between 25 and 48 hours and the effectiveness further drops to 31% at 72 hours between 49 and 120 hours.

Where Morning-after pills are foundEmergency contraceptive pills are available in most pharmacies without prescription and sometimes a pharmacist would ask a few questions before giving them out. According to CMAJ (2005), reclassification of morning-after pills as nonprescription drug thus letting pharmacists to dispense it directly to women is good news but making consultation with pharmacists mandatory is unwelcomed. Cases of abortion have risen both in Canada and globally and almost 50% of pregnancies are unintended regardless of the wider availability of contraceptive methods perhaps because of timely access to physicians. In that case, introducing morning-after pills in pharmacies without prescription is a huge step that will avoid the many cases of abortion and unintended pregnancies. It is apparent that the move of allowing morning-after pills in the pharmacies will definitely balance access to the pills for all women across Canada hence a net reduction in abortion.

Improving access to emergency contraception is significant for a comprehensive program that addresses women’s reproductive and sexual health and is important to the health of teenaged girls and young women. Morning-after pills need to be readily available to both rural and urban women and its accessibility must respect women’s right to privacy in addition to seeking to prevent an unintended pregnancy. Access behind the counter may help in reducing unintended pregnancy because the pills are harmless, effective, and easy to use medication that only requires timeliness. Although privacy may be impossible because the drugs are purchased in public places, taking it off the shelf and directly to the checkout offers a higher degree of privacy. Additionally, making morning-after pills available over the counter provides several options of purchasing the drug thus enhancing privacy. This is because a buyer may avoid either friends or people they know working in the nearby pharmacy that may perhaps interfere with their privacy.

It is argued that consultations with the pharmacists may be a good idea because they are qualified individuals whose counseling may be regarded significant when it comes to contraceptive options. Proponents of pharmacist consultation assert that pharmacists usually have frontline contact with their clients and possess the right qualifications required to provide emergency contraception even though they are not taught counseling in universities. On the other hand, according to CMAJ (2005), anti-pharmacists counseling feel that only a few pharmacists may offer the privacy necessary for such kind of consultation and that the consultation fees attached may act as barrier to many women. Moreover, history of self-administered morning-after pills shows high level of appropriate use and therefore competent women who have experienced contraceptive failure or a lapse in caution do not need unwanted questioning or unsought advice. In cases where clients may not be able to purchase the morning-after pills, the pharmacists refer them to the doctors.

How often should Morning-after pills used

Considering the limit on the number of times morning-after pills may be used, Princeton University’s Office of Population Research (2013) explains that there are no safety concerns about using progestin-only emergency pills more than once. It is argued that morning after pills will always prove effective when used in preventing unintended pregnancy after intercourse provided it is used appropriately. However, sexually active individuals should resort to other birth control techniques such as condoms and or pills before or during intercourse instead of continuous use of the morning-after pills. In some instances, the morning after pills may have some unpleasant side effects and should therefore not used repeatedly. Sexually active people need to talk to their health care providers or check out for better birth control technique options for safety and effectiveness of the methods chosen.Morning – after pills tend to help solving the solution of unwanted pregnancies particularly growing teenage pregnancies. However, it is vital to note that the pills do not prevent spread of sexually transmitted infections that have been on the rise especially amongst teenagers. Teenagers and other adults who engage in unsafe sex without considering the issues of unwanted pregnancies sometimes abuse morning – after pills. Unwanted pregnancies and the wider use of

Morning Ag Clips “U.S. takes action vs. Canadian wine trade measures” by USDA

Name:

Course:

Date:

Journal Entries

27/5/2018 Morning Ag Clips “U.S. takes action vs. Canadian wine trade measures” by USDA

Canada has placed wine measures that don not favour other international wine producers. For instance, British Colombia has a law that excludes all imported wine from the grocery stores. This has raised an alarm to the U.S and other countries since Canada is one of the major markers for United States wine makers. According to Secretary Perdue, they want British Colombians to be given an opportunity to buy wine from the U.S as a great wine producer. The idea of Canada having regulations that discriminate against the U.S is unfair and won’t be tolerated.

The government of the United States through Donald Trump’s administration has requested WTO (World Trade Organisation) to create a dispute settlement panel that will investigate the move taken by Canada and help solve the issue. According to the article Canadian wine measures are against the laws and provisions of WTO thus the government is going to fight for its rights. Wine makers in the U.S gain most of its income from the international sales and when Canada is trying to regulate wine sales in the groceries it means that this is a loss to the U.S wine makers. The reason for requesting the WTO to come in is because in 2017 the U.S held meetings with Canada on the same issue but it was not resolved.

In my own opinion the direction taken by Canada is unfair to other outside markets. The provisions of WTO allow for even trade measures thus Canada needs to adhere to this fact. Canada has its export products and it will be bad for the countries locked away by the wine measure to stop receiving goods from Canada. On the other hand, this is the only way Canada can do to boost local wine sales since imported wine seem to gain more market than local wine. Thus Canada need to revisit their wine measures of restricting sales of imported wine in groceries but have a limit so that both the international and local markets are not affected.

https://www.morningagclips.com/u-s-takes-action-vs-canadian-wine-trade-measures/17/10/2017 CBC News “U.S. makes ‘aggressive’ demands to access Canadian dairy market, wants end to supply management” by Katie Simpson.

The article is about U.S aggressiveness of seeking ten times of what Canada agreed to give up in the TTP. Canada has a protected dairy market that the U.S wants it to be opened and termination within a decade of supply management that protects Canada’s industry. The motive behind this is to widen the producers market in the U.S. the president of the U.S farmers said that they are not in shock since the demands made by the U.S are similar to the demands made in the other sector. CBC news has learned that the idea of the U.S requesting for transparency might be used to gather information that will be used against Canada later. From the article two sources say that the U.S is using this demand as a way of gathering data that will be used against Canada in a tribunal case of the supply management system. U.S demand for market access may be a way of presenting a full vision of renegotiating NAFTA.

In my own opinion if Canada grants the U.S its demand they will be at risk of losing their dairy markets and U.S market will gain a wider producers market. The U.S is on the run demanding a lot from Canada just like the first article of asking Canada to revisit its wine measures thus the U.S might be at a trade war with Canada in the near future. It seems the U.S doesn’t want Canada to have a protected marked with the fear of losing sales from the Canadian market. Market transparency might be risky since through transparency a lot of information can be leaked to the competitor. It is upon Canada to weigh the advantages and disadvantages before granting the U.S its demands.

https://www.cbc.ca/news/politics/united-states-dairy-market-demands-1.43568405/4/2018 The Guardian “How a US-China trade war would hurt us all” by Linda Yueh.

Creating trade barriers will damage the world at large and not only china and the U.S will be affected. Trade barrier will have product and serviced increase in price and also the global supply chain will be interrupted. China and the U.S currently are having tit for tat exchange tariffs which might lead to a trade war in a few years’ time. The Trump administration announced the imposition of tariffs on a range of Chinese products, china responded to this by having tariffs on U.S imports. Possibly the next step will be to restrict Chinese investment in America and if so then China will give a similar response. This tit for tat game, will be damaging both countries since companies such as Apple have invested in the two. If china and the U.S do not come to the table for an agreement more trade barriers will be seen not only in them but other countries too.

In my opinion the battle between china and USA is aimed at no good and the two super power countries can continue with their tit for tat game but they have to put in mind the economy of other countries that will be affected with their trade war. Third world countries depend so much of the super power countries and if they create barriers and trade tariffs among themselves then it will be difficult for the developing countries. The U.S.A has an aim to distract the made in china 2025 plan which is aimed at making china manufacturing globally. U.S.A and China need to sit and table their issues come to an agreement and solve their trade disputes thus enhancing peace.

https://www.theguardian.com/commentisfree/2018/apr/05/us-china-trade-war-supply-chains-consumers25/11/2017 Emerald Insight “Conflict, international trade and President Trump’s isolationist policies” by Yusuf Ayotunde AbdulkareemThe article stats by explaining President Trump’s policies that aim at showing reminiscent of the era of the smooth Hawley tariff of the 1930s. the article is a research paper that shows hoe Trumps administration has uneasy relationship with other governments which is going to harm the U.S economy. The idea of isolates is seen not to work yet President Trump has embraced such policies. The article compares current regime in America to that of the 1930s which was characterized by isolationism. There is tension in international trade and this is linked to the conflict that the U.S is having with other super powers majorly china. Trump’s isolationist policies are certainly going to harm the USA in the long run and a big part of that is because of the personality of the President himself.

In my own opinion the paper by Yusuf takes the right direction of research in international trade and conflict. It is true that isolationism ideas will never impact a country positively but rather the country’s economy will be affected since economy is boosted by international trade. America has tensions with other countries and from the previous article this tensions are creating bad relationship and soon there will be a trade war between china and the U.S.A. Isolating from the other countries will make U.S. A’s economy to go down since even other developing countries might not want to associate with a country that detaches from other super powers. Thus countries need to work together to enhance peace, share ideologies and promote international trade which will in turn boost economy.

https://www.emeraldinsight.com/doi/abs/10.1108/JITLP-07-2017-002413/8/2018 The Guardian” Is Free Trade Always the Answer” by Richard Partington.

Concerns continue to increase over Donald Trump’s import tariffs as ministers negotiate Britain’s trading with Europe. Free trade allows free flow of goods along international boarders without being taxed which generates wealth. Free trade has lifted a lot of people around the world out of poverty. Cheaper labor costs appear to be giving china an added advantage over western countries in the manufacturing sector. The main ideology behind import tariffs in to make imported good a bit expensive than local goods thus promoting the local manufacturers. Countries in the WTO signed up an agreement to keep their tariffs to a certain limit, U.S is a major driving force but Trump view this membership as a disaster. According to the economists’ international competition ushers in innovations. The existing U.S tariffs according to economists might trigger job losses and a weaker economic growth.

In my own opinion the idea of free trade is good since it boosts economic growth and creates wealth for the poor communities. Imposing tariffs on imported goods might seem effective for the short term period but long term effects are negative. Increasing import duty in the US might lead to countries withdrawing from selling their goods in America which will be a loss to the country. Members of the WTO need to embrace the terms and limits they signed up for till when new limits are agreed by the whole membership. Also free trade is good since it makes imported goods cheaper and affordable thus promoting international trade and a country having a diversity of goods. When having taxes on imports it will affect international trade and in the long run there will be product monopoly in the country.

https://www.theguardian.com/business/2018/aug/13/is-free-trade-always-the-answer14/1/2017 The Guardian. “Aid in reverse: how poor countries develop rich countries” by Jackson Hickel.

Research shows that developing countries send trillions to the west than the other way round. We have always known that the first world countries give the developing countries to help eradicate poverty. The US-based Global Financial Integrity (GFI) and the Centre for Applied Research at the Norwegian School of Economics a few months contradicted this with the idea that the flow of money from rich countries to the third world countries pales in the comparison to the flow that run the other direction. The statement means that rich countries are not developing poor countries but it is the other way round. Through invoice faking multinational companies from the first world countries get a way to steal from the poor countries. They do so by shifting also the developed countries take advantage and give the poor countries loans on interests which the loans become huge thus difficult to pay yet the interests continue to build up. The developing countries end up paying a huge debt that what they borrowed thus making these countries rich.

In my own opinion developing countries need generosity from the developed countries and not them taking advantage and stealing from them. It is true that developing countries are making rich countries richer since for over a decade we have not seen a big improvement from the third world countries yet the first world countries continue to emerge competing to be super powers. There have been reports of countries having hug debts by world bank yet the richer countries continue to give them funds and later go to exploit resources in the developing countries. Developing countries need justice and if possible they could be given debt reliefs to help them pick up a fresh.

https://www.theguardian.com/global-development-professionals-network/2017/jan/14/aid-in-reverse-how-poor-countries-develop-rich-countries

case_study

Case study

Student’s name

Affiliation

Date

There are various cause of hypothyroidism which include lack of iodine and autoimmune condition Hashimoto’s thyroiditis, an injury in the hypothalamus, an initial treatment of a radioactive, pituitary gland, a previous thyroid surgery, and lack if a functioning thyroid at birth and even use of certain medications. When the TSH test shows it has come back to normal and the symptoms still show hypothyroid, the level of free T4 Should be measured in one’s blood stream. Most hypothyroid patient have high levels of TSH and low levels of T4 which is known as primary hypothyroidism. This takes place because the pituitary gland has realized that the thyroid does not produce enough hormones.

Due to that the pituitary gland releases more TSH in order to motivate the thyroid into a creating hormone (Allahabadia .et.al, 2009). If the thyroid is not functioning well it will not respond to the pituitary signs and this will lead to low levels of free T4 and high levels of TSH. When one has free T4 levels that are low the range will be lower than 5micrograms per deciliter.Bertha had pneumonia which is a lung disease and pleural effusion affect the lungs during inspiration and expiration. Bertha had pneumonia bacteria which comes together with parapneumonic effusion this might have led to pleural effusion (Light, 2007) .A pleural effusion occurs when an abnormal fluid collects in chest within the pleural and visceral areas. Bertha’s rate was reduced because er heart rate had slowed which lead to decreased blood circulation in the heart and other organs. Myxedema coma is an advanced hypothyroid and If Bertha does not get intensive care she is at high risk

References

Allahabadia A., Razvi S., Abraham P., Franklyn . Diagnosis and treatment of primary hypothyroidism. British Medical Journal (International Edition) [serial online]. 2009;338:1090. Available from: Health Module. Accessed February 19, 2010, Document ID: 1731734701.

Light RW. Pleural Diseases Fifth Edition. Philadelphia, PA: Lippincott Williams & Wilkins; 2007.

Refetoff S. Thyroid function tests. In: DeGroot ED. ed. Endocrinology. New York: Grune & Stratton, 1979;1:387–428.

Adjustment of the Project’s Working Timeline and Schedule

To: weim@osint.comSubject: Adjustment of the Project’s Working Timeline and Schedule

Dear Mr. Wei,

I am writing to brief you of the current progress of the project and to also inform you of a regrettable and unprecedented delay in the Deep Learning Model Project. Accordingly, we have adjusted the timeline to fit the new scenario.

The project is facing some difficulties at the moment. The trained YOLO deep learning classification model works with 95% accuracy on the most common fish that were first tested but has only 37% accuracy on rare fish, camouflaged fish, and three species of fish with similar colouring. As a result, detection and classification of these groups is not consistent. Due to the need to provide accurate results, we have had to apply a combination of techniques including generating augmented data for the rare fish specifies and to modify the deep learning model for the camouflaged fish. We are also preparing to label more training examples for the three similar species of fish. As you are well aware, each of the aforementioned techniques has been used before to solve other problems but we will need to adapt them for our data.

Therefore, the current problem is on providing consistent results for the project to be used for purposes of our project. The scope of the project has expanded due to the unforeseen need to conduct more research and to apply more techniques to cover the base of the project. Consequently, the time needed to complete this phase of the project has had to be adjusted. We are not in a position to provide a working deadline or timeframe for the remaining parts of the project, but we will furnish you with this information in the course of the week.

We are very confident that we will solve the delay and come up with solutions toward a reliable technique that can be used during the course of the project. All our attention is focused on the completion of this project, including the provision of accurate data and information for purposes of our cooperation.

Our team expresses much appreciation for your understanding and flexibility as we endeavor to tackle this unforeseen issue. We know that you understand the need for us to provide accurate information in every step of the way.

Thank you. Please feel free to contact me in case you have any questions regarding the time extension, the pending schedule, or the expansion of the scope of the project.

Sincerely,

Enter Name

Cases of news journals or article that do not seem to give complete information has been on the rise in the 21st century.

Cases of news journals or article that do not seem to give complete information has been on the rise in the 21st century. Getting the right and accurate information out there is no longer a big deal as getting a news piece or article that will get more reading and clicks which translates to more money is far much important. The press has often been seen as a corrupt entity just as much as how the government is corrupt. News press accept bribes not a physical way but in a systematic sense. The news should often report the truth as they owe the public however we see that the government and the media are entwined in a circle of mythmaking and manipulation. Certain news articles are often written to propagate certain agendas or to pass a misleading information out there. This essay will look at three news stories that have non truth telling context.

In 2016 during the Presidential campaign, a term Pizzagate theory emerged. This was a fake story that had been created on Hillary Clinton Presidential campaign. According to the story, John Podesra who was Hillary Clinton campaign manager had his email hacked. There were speculations that he among other top Democratic officials ran a human trafficking ring. Although this information was not founded there were several mainstream medias that took up the story. According to them two restaurants Pizzagate and DC, Comet Ping Pong pizzeria were where the meetings were held. This story did quickly spread to all social media platforms and even top officials most from the Republican party were engaging in it. With a lot of engagements, it was getting it quickly did spread although every single accusation was false. This false story caused a lot of damage to the two restaurants and while the news stories were running they were losing profits because were avoiding the place. There was also a shooting as a man walked into Comet Pizzeria with an assault rifle and fired shots because of the non-truth telling news that were being spread.

Mainstream medias have fallen victims of reporting half-baked news that seem to have little lies. Recently Fox news offered an apology on their fake news that was targeting Cal Poly. There was a news headline after they interviewed a conservative student on the plight of conservative that said “CAL POLY PLOTS TO REDUCE WHITE ENROLLMENT” (Sheeler, 2018). This was actually untrue as it was claiming that Cal Poly was using a race-based admission process v which was against Proposition 209 passed by Californian voters in 1996 that prohibited the public universities from using race to increase either the number of Latinos, African American or other underrepresented students. This caused a lot of anger that Fox eventually had to apologize for this mistake. When one got to read the article, the headline might have been misleading but the content gave a little bit of an understanding of what they were saying. With the lie on their headline, they were more likely to get the clicks and more people were likely to read the article as opposed to if they actually used the correct news headline.

CNN in 2017 reported a story that linked Antony Scaramucci to a Russian investment firm. The story reported that the Congress was investigating a Russian investment fund that had ties with Trump officials. According to the reporter, the information came from an anonymous single source. The story was not really wrong but it did lack enough facts for it to be published. The article reported that a meeting had taken place between Antony Scaramucci and Kirill Dmitriev. This news led to resignation of three CNN journalist who were part of an investigative team that had been created in CNN to look into investigative stories that will be run by the news network. As news network it is important to get the facts right on a story before publishing especially if it involves hefty matters that are likely to get the attention of many. Many news sources know that any link between Trump and Russia is likely to get a huge reading thus there was need to get all the facts right before publishing the story. The fact that a reputable news network would publish a news article based on a single anonymous source without proof is quite saddening and goes against the ethics of journalism.

Plato and Aristotle have often been seen as post-truth philosophers. Plato in terms of truth and governance he talks of how to set up a just society and one way of setting it up is having a divided view on what one should let people know. Plato in his argument believes that the kind of knowledge a society needs is the one that is necessary for their lives. When Martha Stewart was linked to the crime of Insider trading at Imclone. IN2001, she sold her shares of the company and just two days later the stock values dropped. By selling her shares before the value dropped she had saved $45,673. However, she was not the only one that had benefitted as the CEO had also sold his shares thus they were faced with the case of illegal insider trading. From Stewart’s case, prosecutors worked hard to try and prove that Steward had sold her shares from nonpublic information.

Administering Competency Screening Tests on a Minor

Administering Competency Screening Tests

Name

Institution Affiliation

Date

Administering Competency Screening Tests on a Minor

Abstract

Balancing between Competency Screening Test (CST) expectations and demands of a given situations is normally an uphill task for CST administrators. A CST tool administers tests on juvenile or mentally challenged individuals. The process is tedious since there are several situation of communication breakdown, and this endangers the processes. For this reason, the administering official should displays proper and higher degree of professionalism by using of tests or face-to-face communication with the juvenile. This analysis will appoint Dr. Roberts defense of a 17-year-old individual who has been accused of sexual assault and battery. The juvenile is a linguistically challenged immigrant from Chile. The individual can only communicate Mapudungun and Spanish; however, he can speak and communicate rudimentary English, and this is not positive to the court. The commencing research will prove that Dr. Robert should apply a professional approach to determine the case’s course. The report will further clarify it is appropriate to encourage CST as compared to direct judicial test to minors who are linguistically challenged.

How should Dr. Roberts proceed with the evaluation?

Determining the eligibility of the case is normally an uphill task if the defendant is linguistically challenged. However, this does not deter clinicians from providing a valid assessment of whether the case is in a position to defend himself through language. The male defendant in Dr. Robert case is rather complicated. Accordingly, the young male defendant is not only linguistically challenged but also has a lower I.Q and is paranoid of ideas. Dr. Robert is expected by the judiciary to provide appropriate assessment. For this reason, the evaluation should ascertain judiciary expectations that the defendant is in a position to comply with the appropriate judicial process.

Since Dr. Robert is authorized by the court to conduct an evaluation, it will only be necessary to have the paperwork intact. Dr. Robert should clarify whether the evaluation is appropriately sought and assess possibility of psycho-legal questions is also at hand. Preliminary information seeks to clarify issues that elicit CST concern. This reflects the subject’s background information. The young man can communicate using rudimentary English. Dr. Robert should be able to understand this English when assessing the young man.

Secondly, Dr. Robert should specify the appropriate time, which should be applied during the evaluation process. Time specification reduces redundancy or false information development. For the legal assessment, Dr. Robert should alert the defense counsel to determine how the attorney plans to present the minor. In addition, Dr. Robert should assess whether the attorney understands the defendant situation and whether it is possible to provide reasons for the CST concerns. Thirdly, Dr. Robert should present the situation the minor parents and caregivers (Jackson, Rogers and Sewell, 2005, pp. 201).

Data overview and evaluation is an essential process that should be pursued and demonstrated with proper connection. Empirical demonstration seeks to examine the youth’s behavioral, social, cognitive, and emotional situation. That is, whether the juvenile conducted the act at his right mental status. Dr. Robert should necessitate direct question based on observation, mental status question, interviewing, psychological testing and symptom interviewing. Dr. Robert should adopt the principle of reliability that is, credibility and dependability.

What, if any, testing should be conducted?

As stated, Data overview and evaluation will seek examine test, which will outline possible results. Tests will be necessary to reflect the juvenile situation. Dr. Robert may think it prudent to use a Competency Screening Test (CST) tool. The test will initialize standardized and scoring tools that are presented on a scale of 0-2 with two meant to reflect a higher degree of sentence completion showing a higher degree of legal comprehension and 0 presenting a low level. Test administration time should be over 25 minutes.

Dr. Robert will have to examine the test results presented during the interview. If the defendant scores below 20, this will request for a comprehensive evaluation. Twenty is according to reliable standards established for the tests. Errors are part of the test results, and they happen to indicate false positives; for example, labeling the minor as incompetent whereas he is competent. Dr. Robert should therefore specify room error even though this provision is controlled. False positive rate should sufficiently demonstrate lower instrumental competence, and these will encourage Dr. Robert to initiate a more decisive evaluation. Testing tool will further seek to clarify a false result that is a percentage, which ranges from 14.3% to 28.6% and is maintained and controlled at that point.

Should he use an individual who speaks Spanish to assist with the evaluation?

Using an individual who speaks French is an ideal approach, however for clinical competence, and this not prove a reliable loom. Rosner (2006, pp. 218) argues that translators are very essential at the judicial court level since the magistrate or the clerk may fail to understand the defendant language. However, in a clinical test, dealing with the juvenile directly is essential since this enables communication. Additionally, Dr. Robert test seek to clarify whether the Juvenile is capable of presenting himself in court of law. There are several problems associated with involving a translator at the clinical level. Most of these problems cannot be extinguished by mere counseling, and it is up to practitioners like Dr. Robert to go the last mile.

It is hard to get a competent translator and according to the extract, and the county does not have finances to hire for a translator neither does Dr. Robert. Secondly, translators utilizing a language fluently are hard to get, and the defendant rudimentary English might be much better. A non-professional translator will naturally pose as competent, and this seeks to sabotage the development of the process.

Thirdly, a mental health professional is likely to exit effectual qualities conveyed in a statement, and this are transported directly as opposed to being experienced directly. Quality and accuracy is the key in the clinical health experiences. Further to this, respond patterns might change valiantly. Emotional issues for instance, visual response, remorse and expression may not be experienced yet this communicates much better than the verbal communication based on the nature of the case. Additionally, a translator might be from the Juvenile Spanish background. This is dangerous since the translator might use his fairer better I.Q to alter various sections of the information with intent to help the juvenile.

Moreover, having a translator on board might deter the quality of the case. Assuming the only available translator is feminine; the Juvenile might feel withdrawn from sharing vital information with the translator. Alternatively, the translator might be withdrawn by the case and might present deceitful information with intent to conduct personal judgment. This is true when self-disclosure of an examiner seeks to present evaluations, and that occur in emotionally intense situation. Rosner (2006, pp. 218) argues that issues related to shame and face-savings play a critical role of everyday situation. Dr. Roberts might inquire factors, which create shaming situation, and the examiner fails to get important information regarding the situation. Hence, the quality of information is a serious stake when it comes to translator.

Firstly, it is a prerequisite that the test construct should be observable by the Dr. Roberts and the juvenile in constructing a conceptual framework. This is a measure of agreement between and concept and where it is derived from. For the content of the interview, it is necessary to create a criterion validity, which has different subscales, and all should be convergent. The goal is to determine the degree of detail that should be dealt with at each specific test. Additionally, Dr. Roberts should apply predictive validity evidence to examine the criterion of the performance assessment instrument. Certification screens identify the extent at which individuals are excluded on the pass test results.

Consequential validity is a central interpretation of test scores, and this appraises the social impact of the examination to the juvenile. A close example of these questions is how the juvenile could have acted in normal life situation. Social impact expresses the degree of persistence and the competencies measured in the assessment over a significant lapse of time during the interview. As part of the ethical principles, Dr. Robert should ensure that the amount time he spends on a juvenile should be proportionate on the nature of I.Q.

What are the ethical issues faced by Dr. Roberts?

Dr. Roberts might fail serious ethical issues hurting standards and governing the relationship between him and the juvenile, him and the judiciary and him and the society. Other issues include secret remedies and exclusive methods of location and appearance and presentation. While most of these requirements are primarily met, it is good to note that the there are other professionals standards that Dr. Roberts should maintain, and this are responsive directly based on the nature of the case.

CST faces critical ethical challenges as it enters the twenty-first century. Struggles seek to meet mission of a changing CST system from one, which is not investigative based to that which understanding based. One serious ethical issue is freedom versus control. The juvenile feels that he want to make some choices yet this constrains Dr. Robert, who is supposed to handle the juvenile as convict. Secondly, another issue involved empirical knowledge versus personal belief. The juvenile might begin feeling nervous and needs a responsive restoration of his normal life, which hinders the development of the case. Thirdly, Dr. Robert also faces significant effects of differences between telling the truth. Dr. Robert might attempt to hold some information from the authority since this might sabotage the development of the case at that particular time. Finally, distribution of resources remains a significant problem towards the development of the case. Some of Dr. Robert C.S.T tools might be absence and this endangers the overall professional development of the situation

How should he resolve these ethical dilemmas?

According to the above ethical possible ethical issues, it is notable that much should be done with intent to protect Dr. Robert professionalism. The chief problems of freedom and empirical knowledge should be handled professionalism by making the juvenile understand the fundamentality of the process. Secondly, issues related to deceit should not be Dr. Robert concern. At all stages, Dr Robert should control the juvenile and assume full responsibility of the how the interview enfolds (Hunter, 2007, pp. 241).

In addition, Dr. Robert should ensure that ethical principles required incompetency are not eroded either physical or mental maturation. Changing attitudes, physical maturation and constraints should not be allowed to hijack the process of evaluation. Validation fosters proper ethical principles; a close example is the face-to-face evaluation. Dr. Robert should face a test juvenile at all time on the eyes but with a charming and professional manner. Additionally, Dr. Robert should organize interviews based on protocol of flow and issues should be not overriding each other. Interviews should be based on APA principles and should focus on getting information in a much friendlier professional way and not hurting the juvenile. Finally, documentation of each process is necessarily as far as ethical issues is concerned.

References

Hunter, D. (2007). Proportional ethical review and the identification of ethical issues. Journal of

Medical Ethics, 33(4), 241-245.

Jackson, R. L., Rogers, R., & Sewell, K. W. (2005). Forensic Applications of the Miller Forensic

Assessment of Symptoms Test (MFAST): Screening for Feigned Disorders in Competency to Stand Trial Evaluations.. Law and Human Behavior, 29(2), 199-210.

Rosner, F. (2006). Medical Research in Children: Ethical Issues. Cancer Investigation, 24(2),

218-220.

Morphemes are the smallest units that hold meaning in language or an element of a word such as –ing in walking.

Morphemes

Morphemes are the smallest units that hold meaning in language or an element of a word such as –ing in walking. They can not be divided further into any small parts that have meaning. Phonemes on the other hand are the smallest units of sound which are found in a language. These are small phonetic units found in a particular language that have the capability of completely changing the entire meaning of a particular word such as b in bat and c in cat in English. In English the word cat can not be broken down into small ideas that are based on the word. This means that “cat” is completely a sound of its own. On the other hand each and every letter in the word ”cat” corresponds to a particular sound which if put separately they can not be complete with each other. In English there are various cases where more than a single phoneme is in correspondence with a single morpheme. For example telephone contains two morphemes which are tele and phone and within the same words there are other several phonemes which are t, e, l, e, f, o, and n.

This paper will therefore identify some of the morphemes and phonemes which are found within some phrases.

Morphemes

Morphemes can be classified into two broad categories they are either free or bound. These two morpheme categories are mutually exclusive to each other. This therefore means that a particular morpheme can only belong to a particular category. So/me gentle /men dined at an economical restaurant. They found the service to be un /acceptable and wish/ed to ex/press their un/happiness to the man/age/ment. The manager was un/available, so they brought the left/overs home to their dog who resided in a dog/house in the back/yard. These phrases contain various morphemes, some of then are free while others are bound. These morphemes are so and me in some, gentle and man in gentleman, un and acceptable in unacceptable, wish and ed in wished, ex and press in express, un and happiness in unhappiness, man, age and ment in management, un and available in unavailable, left and overs in left overs, back and yard in backyard and lastly dog and house in dog house. Among the free morphemes are gentle,men,acceptable,wish,available,press,man,age,left,overs,dog,house,back, and yard. They are classified as free morphemes because each of the morphemes can exist and function as complete words with specific meanings independently.

The Bound morphemes on the other hand are so, me, ed, un, ment, ex .these morphemes are classified as bound since they form part of words and act as conjunctions with roots or even other free morphemes or other bound morphemes. For instance un is only found together with other morphemes so that it forms a word with meaning. Most of these morphemes are prefixes like ex, un and suffixes like –ed,-ment while others are cranberry morphemes which are neither prefixes nor suffixes such as so and me.

Phonemes

There are various phonemes found in English. There are close to forty phonemes found in English. The phrase “There was an old woman who swallowed a fly. I don’t know why she swallowed a fly. Perhaps she’ll die” contains various phonemes This can be represented in the IPA format as follows

/ðɛər/-there,/ wʌz/-was, /æn/-an, /oʊld/-old, /wʊmən/-woman, /swɒloʊ/-swallow, /flaɪ/-fly, /doʊnt/- don’t, /noʊ/-know, ,/ waɪ/-why, /ʃi/-she, /pərˈhæps/-perhaps, /ʃil/-she’ll, /daɪ/-die. Therefore all these words have particular phonemes in them which are represented.

Addressing the Increase in the number and Types of Computer Crimes

Addressing the Increase in the number and Types of Computer Crimes

THESIS: Laws must be passed to address the increase in the number and types of computer crimes.

Over the last twenty years, a technological revolution has occurred as computers are now an essential element of today’s society. Large computers are used to track reservations for the airline industry, process billions of dollars for banks, manufacture products for industry, and conduct major transactions for businesses because more and more people now have computers at home and at the office.

People commit computer crimes because of society’s declining ethical standards more than any economic need. According to experts, gender is the only bias. The profile of today’s non-professional thieves crosses all races, age groups and economic strata. Computer criminals tend to be relatively honest and in a position of trust: few would do anything to harm another human, and most do not consider their crime to be truly dishonest. Most are males: women have tended to be accomplices, though of late they are becoming more aggressive. Computer Criminals tend to usually be “between the ages of 14-30, they are usually bright, eager, highly motivated, adventuresome, and willing to accept technical challenges.”(Shannon, 16:2)

“It is tempting to liken computer criminals to other criminals, ascribing characteristics somehow different from ‘normal’ individuals, but that is not the case.”(Sharp, 18:3) It is believed that the computer criminal “often marches to the same drum as the potential victim but follows and unanticipated path.”(Blumenthal, 1:2) There is no actual profile of a computer criminal because they range from young teens to elders, from black to white, from short to tall.

Definitions of computer crime has changed over the years as the users and misusers of computers have expanded into new areas. “When computers were first introduced into businesses, computer crime was defined simply as a form of white-collar crime committed inside a computer system.”(2600: Summer 92,p.13)

Some new terms have been added to the computer criminal vocabulary. “Trojan Horse is a hidden code put into a computer program. Logic bombs are implanted so that the perpetrator doesn’t have to physically present himself or herself.” (Phrack 12,p.43) Another form of a hidden code is “salamis.” It came from the big salami loaves sold in delis years ago. Often people would take small portions of bites that were taken out of them and then they were secretly returned to the shelves in the hopes that no one would notice them missing.(Phrack 12,p.44)

Congress has been reacting to the outbreak of computer crimes. “The U.S. House of Judiciary Committee approved a bipartisan computer crime bill that was expanded to make it a federal crime to hack into credit and other data bases protected by federal privacy statutes.”(Markoff, B

13:1) This bill is generally creating several categories of federal misdemeanor felonies for unauthorized access to computers to obtain money, goods or services or classified information.

This also applies to computers used by the federal government or used in interstate of foreign commerce which would cover any system accessed by interstate telecommunication systems.

“Computer crime often requires more sophistications than people realize it.”(Sullivan, 40:4) Many U.S. businesses have ended up in bankruptcy court unaware that they have been victimized by disgruntled employees. American businesses wishes that the computer security nightmare would vanish like a fairy tale. Information processing has grown into a gigantic industry. “It accounted for $33 billion in services in 1983, and in 1988 it was accounted to be $88 billion.” (Blumenthal, B 1:2)

All this information is vulnerable to greedy employees, nosy-teenagers and general carelessness, yet no one knows whether the sea of computer crimes is “only as big as the Gulf of Mexico or as huge as the North Atlantic.” (Blumenthal,B 1:2) Vulnerability is likely to increase in the future. And by the turn of the century, “nearly all of the software to run computers will be bought from vendors rather than developed in houses, standardized software will make theft easier.” (Carley, A 1:1)

A two-year secret service investigation code-named Operation Sun-Devil, targeted companies all over the United States and led to numerous seizures. Critics of Operation Sun-Devil claim that the Secret Service and the FBI, which have almost a similar operation, have conducted unreasonable search and seizures, they disrupted the lives and livelihoods of many people, and generally conducted themselves in an unconstitutional manner. “My whole life changed because of that operation. They charged me and I had to take them to court. I have to thank 2600 and Emmanuel Goldstein for publishing my story. I owe a lot to the fellow hackers and fellow hackers and the Electronic Frontier Foundation for coming up with the blunt of the legal fees so we could fight for our rights.” (Interview with Steve Jackson, fellow hacker, who was charged in operation Sun Devil) The case of Steve Jackson Games vs. Secret Service has yet to come to a verdict yet but should very soon. The secret service seized all of Steve Jackson’s computer materials which he made a living on. They charged that he made games that published information on how to commit computer crimes. He was being charged with running a underground hack system. “I told them it was only a game and that I was angry and that was the way that I tell a story. I never thought Hacker [Steve Jackson’s game] would cause such a problem. My biggest problem was that they seized the BBS (Bulletin Board System) and because of that I had to make drastic cuts, so we laid of eight people out of 18. If the Secret Service had just come with a subpoena we could have showed or copied every file in the building for them.”(Steve Jackson Interview)

Computer professionals are grappling not only with issues of free speech and civil liberties, but also with how to educate the public and the media to the difference between on-line computer experimenters. They also point out that, while the computer networks and the results are a new kind of crime, they are protected by the same laws and freedom of any real world domain.

“A 14-year old boy connects his home computer to a television line, and taps into the computer at his neighborhood bank and regularly transfers money into his personnel account.”(2600: Spring 93, p.19) On paper and on screens a popular new mythology is growing quickly in which computer criminals are the ‘Butch Cassidys’ of the electronic age. “These true tales of computer capers are far from being futuristic fantasies.”(2600: Spring 93:p.19) They are inspired by scores of real life cases. Computer crimes are not just crimes against the computer, but it is also against the theft of money, information, software, benefits and welfare and many more.

“With the average damage from a computer crime amounting to about $.5 million, sophisticated computer crimes can rock the industry.”(Phrack 25,p.6) Computer crimes can take on many forms. Swindling or stealing of money is one of the most common computer crime. An example of this kind of crime is the Well Fargo Bank that discovered an employee was using the banks computer to embezzle $21.3 million, it is the largest U.S. electronic bank fraud on record. (Phrack 23,p.46)

Credit Card scams are also a type of computer crime. This is one that fears many people and for good reasons. A fellow computer hacker that goes by the handle of Raven is someone who uses his computer to access credit data bases. In a talk that I had with him he tried to explain what he did and how he did it. He is a very intelligent person because he gained illegal access to a credit data base and obtained the credit history of local residents. He then allegedly uses the resident’s names and credit information to apply for 24 Mastercards and Visa cards. He used the cards to issue himself at least 40,000 in cash from a number of automatic teller machines. He was caught once but was only withdrawing $200 and in was a minor larceny and they couldn’t prove that he was the one who did the other ones so he was put on probation. “I was 17 and I needed money and the people in the underground taught me many things. I would not go back and not do what I did but I would try not to get caught next time. I am the leader of HTH (High Tech Hoods) and we are currently devising other ways to make money. If it weren’t for my computer my life would be nothing like it is today.”(Interview w/Raven)

“Finally, one of the thefts involving the computer is the theft of computer time. Most of us don’t realize this as a crime, but the congress consider this as a crime.”(Ball,V85) Everyday people are urged to use the computer but sometimes the use becomes excessive or improper or both. For example, at most colleges’ computer time is thought of as free-good students and faculty often computerizes mailing lists for their churches or fraternity organizations which might be written off as good public relations. But, use of the computers for private consulting projects without payment of the university is clearly improper.

In business it is the similar. Management often looks the other way when employees play computer games or generate a Snoopy calendar. But, if this becomes excessive the employees is stealing work time. And computers can only process only so many tasks at once. Although considered less severe than other computer crimes such activities can represent a major business loss.

“While most attention is currently being given to the criminal aspects of computer abuses, it is likely that civil action will have an equally important effect on long term security problems.”(Alexander, V119) The issue of computer crimes draw attention to the civil or liability aspects in computing environments. In the future there may tend to be more individual and class actionsuits.

CONCLUSION

Computer crimes are fast and growing because the evolution of technology is fast, but the evolution of law is slow. While a variety of states have passed legislation relating to computer crime, the situation is a national problem that requires a national solution. Controls can be instituted within industries to prevent such crimes. Protection measures such as hardware identification, access controls software and disconnecting critical bank applications should be devised.

However, computers don’t commit crimes; people do. The perpetrator’s best advantage is ignorance on the part of those protecting the system. Proper internal controls reduce the opportunity for fraud.

BIBLIOGRAPHY

Alexander, Charles, “Crackdown on Computer Capers,” Time, Feb. 8, 1982, V119.

Ball, Leslie D., “Computer Crime,” Technology Review, April 1982, V85.

Blumenthal,R. “Going Undercover in the Computer Underworld”. New York Times, Jan. 26,

1993, B, 1:2.

Carley, W. “As Computers Flip, People Lose Grip in Saga of Sabatoge at Printing Firm”. Wall

Street Journal, Aug. 27, 1992, A, 1:1.

Carley, W. “In-House Hackers: Rigging Computers for Fraud or Malice Is Often an Inside Job”.

Wall Street Journal, Aug 27, 1992, A, 7:5.

Markoff, J. “Hackers Indicted on Spy Charges”. New York Times, Dec. 8, 1992, B, 13:1.

Finn, Nancy and Peter, “Don’t Rely on the Law to Stop Computer Crime,” Computer World,

Dec. 19, 1984, V18.

Phrack Magazine issues 1-46. Compiled by Knight Lightning and Phiber Optik.

Shannon, L R. “THe Happy Hacker”. New York Times, Mar. 21, 1993, 7, 16:2.

Sharp, B. “The Hacker Crackdown”. New York Times, Dec. 20, 1992, 7, 18:3.

Sullivan, D. “U.S. Charges Young Hackers”. New York Times, Nov. 15, 1992, 1, 40:4. 2600: The Hacker Quarterly. Issues summer 92-Spring 93. Compiled by Emmanuel G